{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:28:35Z","timestamp":1725532115733},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642017179"},{"type":"electronic","value":"9783642017186"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01718-6_5","type":"book-chapter","created":{"date-parts":[[2009,5,12]],"date-time":"2009-05-12T09:59:32Z","timestamp":1242122372000},"page":"55-73","source":"Crossref","is-referenced-by-count":0,"title":["Composing Miners to Develop an Intrusion Detection Solution"],"prefix":"10.1007","author":[{"given":"Marcello","family":"Castellano","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giuseppe","family":"Mastronardi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luca","family":"Pisciotta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gianfranco","family":"Tarricone","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"5_CR1","first-page":"27","volume":"35","author":"R.A. Kemmerer","year":"2002","unstructured":"Kemmerer, R.A., Vigna, G.: Intrusion Detection: A Brief History and Overview. Part supplement IEEE Computer\u00a035(4), 27\u201330 (2002)","journal-title":"Part supplement IEEE Computer"},{"key":"5_CR2","volume-title":"37th IEEE Annual Hawaii International Conference on System Sciences","author":"J.G. Tront","year":"2004","unstructured":"Tront, J.G., Marchany, R.C.: Internet security: intrusion detection & prevention. In: 37th IEEE Annual Hawaii International Conference on System Sciences, January 5-8. IEEE Press, New York (2004)"},{"key":"5_CR3","first-page":"26","volume-title":"IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology","author":"C.L. Smith","year":"1999","unstructured":"Smith, C.L., Robinson, M.: The Understanding of Security Technology and It\u2019s Application. In: IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, pp. 26\u201337. IEEE Press, New York (1999)"},{"issue":"10","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1109\/JPROC.2005.853547","volume":"93","author":"R. Kemmerer","year":"2005","unstructured":"Kemmerer, R., Vigna, G.: Hi-DRA: Intrusion Detection for Internet Security. Proceedings of IEEE\u00a093(10), 1848\u20131857 (2005)","journal-title":"Proceedings of IEEE"},{"key":"5_CR5","unstructured":"Anderson, D., Lunt, T.G., Javitz, H., Tamaru, A., Valdes, A.: Detecting Unusual Program Behavior using the StatisticalComponents of the Next-Generation Intrusion Detection ExpertSystem (NIDES). In: Compuler Science Loboratory SRI-CSL-95-06 (May 1995)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1145\/1007568.1007695","volume-title":"ACM-SIGMOD Int. Conf. Management of Data (SIGMOD 2004)","author":"Y. Cai","year":"2004","unstructured":"Cai, Y., Clutter, D., Pape, G., Han, J., Welge, M., Auvil, L.: MAIDS: Mining Alarming Incidents from Data Streams. In: ACM-SIGMOD Int. Conf. Management of Data (SIGMOD 2004), pp. 919\u2013920. ACM Press, New York (2004)"},{"key":"5_CR7","volume-title":"A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic","author":"M. Mahoney","year":"2003","unstructured":"Mahoney, M.: A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic. Florida Institute of Technology, Melbourne (2003)"},{"key":"5_CR8","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: Mining Audit Data to Build ID Model. In: 4th International Conference on Knowledge Discovery and Data Mining, New York, pp. 66\u201372 (1998)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45116-1_16","volume-title":"Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security","author":"A. Seleznyov","year":"2001","unstructured":"Seleznyov, A., Mazhelis, O., Puuronen, S.: Learning Temporal Regularities of User Behavior for Anomaly Detection. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.\u00a02052, pp. 143\u2013152. Springer, Heidelberg (2001)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Pepyne, D.L., Hu, J., Gong, W.: User Profiling for Computer Security. In: American Conference on Control, Boston, June 30 \u2013 July 2, pp. 982\u2013987 (2004)","DOI":"10.23919\/ACC.2004.1386699"},{"key":"5_CR11","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining. In: ACM ICEIS Conference (2005)"},{"key":"5_CR12","unstructured":"Liu, Z., Campbell, R.H., Mickunas, M.D.: Security as services in active networks. In: Seventh International Symposium on Computers and Communications, pp. 883\u2013890 (2002)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Torrellas, G.A.S., Cruz, D.V.: Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control. In: Second IEEE International Conference on Computational Cybernatics, pp. 183\u2013188 (2004)","DOI":"10.1109\/ICCCYB.2004.1437700"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Yau, S.S., Yao, Y., Chen, Z., Zhu, L.: An Adaptable Security Framework for Service-based Systems. In: 10th IEEE International Workshop on Object Oriented Real-Time Dependable Systems, pp. 28\u201335 (2005)","DOI":"10.1109\/WORDS.2005.15"},{"key":"5_CR15","unstructured":"Yao, Z., Kim, D., Lee, I., Kim, K., Jang, J.: A security framework with trust management for sensor networks. In: Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 190\u2013198 (2005)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Feiertag, R., Redmond, T., Rho, S.: A Framework for Building Composable Replaceable Security Services. In: DARPA Information Survivability Conference and Exposition. DISCEX 2000, vol.\u00a02, pp. 391\u2013402 (2000)","DOI":"10.1109\/DISCEX.2000.821536"},{"key":"5_CR17","unstructured":"Chatzigiannakis, V., Androulidakis, G., Maglaris, B.: A Distributed Intrusion Detection Prototype Using Security Agents. In: 11th Workshop HP OpenView University Association (HPOVUA), Paris, France (June 2004)"},{"key":"5_CR18","volume-title":"38th Annual Hawaii International Conference On System Sciences - Track 3","author":"M. Castellano","year":"2005","unstructured":"Castellano, M., Pastore, N., Arcieri, F., Summo, V., Bellone de Grecis, G.: A Flexible Mining Architecture for Providing New E-Knowledge Services. In: 38th Annual Hawaii International Conference On System Sciences - Track 3. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"5_CR19","volume-title":"E-Service Intelligence: Methodologies, Technologies and Application","author":"M. Castellano","year":"2007","unstructured":"Castellano, M., Pastore, N., Arcieri, F., Summo, V., Bellone de Grecis, G.: Orchestrating the Knowledge Discovery Process. In: E-Service Intelligence: Methodologies, Technologies and Application. Springer, Berlin (2007)"},{"issue":"6","key":"5_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4304\/jsw.2.6.30-41","volume":"2","author":"M. Castellano","year":"2007","unstructured":"Castellano, M., Mastronardi, G., Aprile, A., Minardi, M., Catalano, P., Dicensi, V., Tarricone, G.: A Decision Support System base line Flexible Architecture to Intrusion Detection. Journal of Software\u00a02(6), 30\u201341 (2007)","journal-title":"Journal of Software"},{"issue":"6","key":"5_CR21","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/69.250073","volume":"5","author":"C.J. Matheus","year":"1993","unstructured":"Matheus, C.J., Chan, P.K., Piatetsky-Shapiro, G.: System for Knowledge Discovery in Databases. IEEE Transactions on Knowledge and Data Engineering (TKDE), Special Issue on Learning & Discovery in Knowledge-Based Databases\u00a05(6), 903\u2013913 (1993)","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE), Special Issue on Learning & Discovery in Knowledge-Based Databases"},{"key":"5_CR22","unstructured":"Lee, W., Stolfo, S.J.: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. In: 2nd International Workshop on Recent Advances in Intrusion Detection, West Lafayette, IN (1999)"},{"key":"5_CR23","unstructured":"WASET: 4th International Conference on Knowledge Mining. In: Proceedings of World Academy of Science, Engineering and Technology, vol.\u00a026 (2007)"},{"key":"5_CR24","volume-title":"Advances in Knowledge Discovery and Data mining","author":"U.M. Fayyad","year":"1996","unstructured":"Fayyad, U.M., Piatetsky-Shapiro, G., Smith, P., Uthurusamy, R.: Advances in Knowledge Discovery and Data mining. MIT Press, London (1996)"},{"key":"5_CR25","volume-title":"Data Mining: Concepts and Technique","author":"J. Han","year":"2001","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Technique. Morgan Kaufmann Publishers, Academic Press, USA (2001)"},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/TAI.1997.632303","volume-title":"Ninth IEEE International Conference on Tools with Artificial Intelligence","author":"R. Cooley","year":"1997","unstructured":"Cooley, R., Mobasher, B., Srivastava, J.: Web Mining: Information and Pattern Discovery on the World Wide Web. In: Ninth IEEE International Conference on Tools with Artificial Intelligence, pp. 558\u2013567. IEEE Press, New York (1997)"},{"key":"5_CR27","unstructured":"Zhang, W., Tang, X.: Web Text Mining on XSSC. In: Gu, J.F., Nakamori, Y., Wang, Z.T., Tang, X.J. (eds.) KSS 2006, pp. 167\u2013175. Global Link Publisher (2006)"},{"key":"#cr-split#-5_CR28.1","unstructured":"Felici, G., Vercellis, C.: Special Issue in Mathematical Method for Learning. Advances in Data Mining and Knowledge MML (2004);"},{"key":"#cr-split#-5_CR28.2","unstructured":"In: Computational optimization and Applications, vol. 38(2). Springer, Netherlands (2007)"},{"key":"5_CR29","volume-title":"Statistical Data Mining and Knowledge Discovery","author":"H. Bozdogan","year":"2004","unstructured":"Bozdogan, H.: Statistical Data Mining and Knowledge Discovery. Chapman and Hall\/CRC, Boca Raton (2004)"},{"key":"5_CR30","unstructured":"CRoss Industry Standard Process for Data Mining, \n                    \n                      http:\/\/www.crisp-dm.org\/"},{"key":"5_CR31","unstructured":"Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., Wirth, R.: CRISP-DM 1.0 Step-by-step data mining guide. CRISP-DM Consortium. SPSS Inc. (2000), \n                    \n                      http:\/\/www.crisp-dm.org\/CRISPWP-0800.pdf"},{"key":"5_CR32","unstructured":"Wirth, R., Hipp, J.: CRISP-DM: Towards a Standard Process Model for Data Mining. In: 4th International Conference on the Practical Applications of Knowledge Discovery and Data Mining (PADD 2000), Manchester, UK, pp. 29\u201339 (2000)"},{"key":"5_CR33","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: Data mining approaches for intrusion detection. In: 7th USENIX Security Symposium, San Antonio, TX (1998)"},{"key":"5_CR34","volume-title":"Applications of Data Mining in Computer Security","author":"K. Julisch","year":"2002","unstructured":"Julisch, K.: Data mining for Intrusion Detection: a Critical Review. In: Barbara, D., Jajodia, S. (eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publisher, Dordrecht (2002)"},{"key":"5_CR35","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/90.944338","volume":"9","author":"V. Paxson","year":"2001","unstructured":"Paxson, V., Floyd, S.: Difficulties in simulating the internet. Transactions on Networking\u00a09, 392\u2013403 (2001)","journal-title":"Transactions on Networking"},{"key":"5_CR36","unstructured":"Hackathom, R.D.: Web Farming for the Data Warehouse. In: Gray, J. (Series ed.) The Morgan Kaufmann Series in Data Management Systems (1998)"},{"key":"5_CR37","unstructured":"IBM, BEA Systems, Microsoft, SAP AG, Siebel Systems: Business Process Execution Language for Web Services (BPEL4WS), \n                    \n                      http:\/\/www.ibm.com\/developerworks\/library\/specification\/ws-bpel\/"},{"key":"5_CR38","unstructured":"IBM, BEA Systems, Microsoft, SAP AG, Siebel: SystemsBusiness Process Execution Language for Web Services: Version 1.1, \n                    \n                      http:\/\/download.boulder.ibm.com\/ibmdl\/pub\/software\/dw\/specs\/ws-bpel\/ws-bpel.pdf"},{"key":"5_CR39","unstructured":"Peltz, C.: Web Service Orchestration: a review of emerging technologies, tools, and standards.Techical report, Hewlett-Packard Company (2003)"},{"key":"5_CR40","unstructured":"GATE \u2013 General Architetcture for Text Engineering, \n                    \n                      http:\/\/gate.ac.uk\/"}],"container-title":["Lecture Notes in Computer Science","Privacy, Security, and Trust in KDD"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01718-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T21:47:37Z","timestamp":1551995257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01718-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642017179","9783642017186"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01718-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}